A. The forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual sourceB. The criminal act of sending an illegitimate email, falsely claiming to be from a legitimate site in an attempt to acquire the user’s personal or account informationC. Sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address Is hosted to cause a denial-of-service attackD. A sudden spike of “Reply All” messages on an email distribution list, caused by one misdirected message

Answer: A

QUESTION 150An image is an artifact that reproduces the likeness of some subject. These are produced by optical devices (i.e. cameras, mirrors, lenses, telescopes, and microscopes).Which property of the image shows you the number of colors available for each pixel in an image?

QUESTION 153Data files from original evidence should be used for forensics analysis

A. TrueB. False

Answer: B

QUESTION 154FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient storage capacity. What is the maximum drive size supported?

A. 1 terabytesB. 2 terabytesC. 3 terabytesD. 4 terabytes

Answer: B

QUESTION 155Data acquisition system is a combination of tools or processes used to gather, analyze and record Information about some phenomenon. Different data acquisition system are used depends on the location, speed, cost. etc. Serial communication data acquisition system is used when the actual location of the data is at some distance from the computer. Which of the following communication standard is used in serial communication data acquisition system?

A. Source of security incidents’ and network attacksB. Path of the attackC. Intrusion techniques used by attackersD. Hardware configuration of the attacker’s system

Answer: ABC

QUESTION 157Dumpster Diving refers to:

A. Searching for sensitive information in the user’s trash bins and printer trash bins, and searching the user’s desk for sticky notesB. Looking at either the user’s keyboard or screen while he/she is logging inC. Convincing people to reveal the confidential informationD. Creating a set of dictionary words and names, and trying all the possible combinations to crack the password

Answer: A

QUESTION 158Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-Fi networks?

A. WarWalkingB. WarFlyingC. WarChalkingD. WarDhving

Answer: C

QUESTION 159Which of the following is not a part of the technical specification of the laboratory-based imaging system?